Category

Latest

Category

Denial of service, intrusion into the corporate system for hacking and data theft, today cyber attack techniques are numerous and increasingly sophisticated. To understand them is already to protect oneself. No company is safe from a cyberattack. Malware, APT, DoS, DDoS, ransomware … the processes are numerous and the objectives varied. Vincent Nguyen, Manager of CERT-Wavestone, categorizes cyberattacks into three levels: “The first is the diffuse attack, that is, mass aggression. In this process, the…

Avast, Avira, BitDefender, Eset, F-Secure, Data G, Kaspersky, McAfee, Norton, Trend Micro. Ten suites claim this year defend better than any other, not only the security of your PC, but also that of your smartphones, tablets and Mac. What is it really ? 2017 announces no lull on the front of the dangers on line and the threats conveyed by Internet. All experts agree that attacks by Ransomware, Phishing and Trojans will give no respite…